Volume 44 Issue 4
Aug.  2015
Article Contents

WU Ya-dong, JIANG Hong-yu, ZHAO Si-rui, LI Bo. 3D Visualization Method for Network Security Data[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 594-598. doi: 10.3969/j.issn.1001-0548.2015.04.020
Citation: WU Ya-dong, JIANG Hong-yu, ZHAO Si-rui, LI Bo. 3D Visualization Method for Network Security Data[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 594-598. doi: 10.3969/j.issn.1001-0548.2015.04.020

3D Visualization Method for Network Security Data

doi: 10.3969/j.issn.1001-0548.2015.04.020
  • Publish Date: 2015-08-15
  • [1] 吕良福, 张加万, 孙济洲, 等. 网络安全可视化研究综述[J]. 计算机应用, 2008, 28(8): 1924-1927.
    [2] LÜ Liang-fu, ZHANG Jia-wang, SUN Ji-zhou, et al. Review on the research of network security visualization[J]. Journal of Computer Application, 2008, 28(8): 1924-1927.
    [3] KAKURU S. Behavior based network traffic analysis tool[C]//2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). Xi'an: IEEE, 2011: 649-652.
    [4] GOODALL J R. Visualization is better! a comparative evaluation[C]//6th International Workshop on Visualization for Cyber Security. Atlantic City, NJ: IEEE, 2009: 57-68.
    [5] SESTAK K, HAVLICE Z. Visualization of critical properties of databases of information systems[C]//2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics(SAMI). Herl'any: IEEE, 2015: 123-128.
    [6] REN D, ZHANG X, WANG Z, et al. WeiboEvents: a crowd sourcing Weibo visual analytic system[C]//Pacific Visualization Symposium (PacificVis). Yokohama, Japan: IEEE, 2014: 330-334.
    [7] KEIM D A. Information visualization and visual data mining[J]. IEEE Transactions on Visualization and Computer Graphics, 2002, 8(1): 1-8.
    [8] CARVAJAL A. Quantitative comparison between the use of 3D vs 2D visualization tools to present building design proposals to non-spatial skilled end users[C]//9th International Conference on Information Visualisation. Washington DC, USA: IEEE Computer Society, 2005: 291-294.
    [9] STOTT D T, GREENWALD L G, KREIDL O P, et al. Tolerating adversaries in the estimation of network parameters from noisy data: a nonlinear filtering approach[C]//Military Communications Conference, 2009. Boston, MA, USA: IEEE, 2009: 1-7.
    [10] LAU S, RED C, NIMDA B, et al. The magazine archive includes every article published in communications of the ACM for over the past 50 years[J]. Communications of the ACM, 2004, 47(6): 25-26.
    [11] WARE C. Information visualization: Perception for design[M]. Waltham, MA: Elsevier, 2013.
    [12] KOIKE H, OHNO K. SnortView: Visualization system of snort logs[C]//Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York, USA: ACM, 2004: 143-147.
    [13] COCKBURN A. Revisiting 2D vs 3D implications on spatial memory[C]//Proceedings of the 5th Conference on Australasian User Interface. Sydney, Australia: Australian Computer Society Inc, 2004: 25-31.
    [14] HUBONA G S, WHEELER P N, SHIRAH G W, et al. The relative contributions of stereo, lighting, and background scenes in promoting 3D depth visualization[J]. ACM Transactions on Computer-Human Interaction (TOCHI), 1999, 6(3): 214-242.
    [15] SHIRAVI H, SHIRAVI A, GHORBANI A A. A survey of visualization systems for network security[J]. IEEE Transactions on Visualization and Computer Graphics, 2012, 18(8): 1313-1329.
    [16] NUNNALLY T, CHI P, ABDULLAHK, et al. P3D: a parallel 3D coordinate visualization for advanced network scans[C]//2013 IEEE International Conference on Communications (ICC). Budapest, Hungary: IEEE, 2013: 2052- 2057.
    [17] NUNNALLY T, ULUAGAC A S, COPELAND J A, et al. 3DSVAT: a 3D stereoscopic vulnerability assessment tool for network security[C]//2012 IEEE 37th conference on Local Computer. FL: IEEE. 2012: 111- 118.
    [18] NAEDELE M. Standards for XML and Web services security[J]. Computer, 2003, 36(4): 96-98.
    [19] SHOEMAKE K. Animating rotation with quaternion curves[C]//ACM SIGGRAPH computer graphics. New York, USA: ACM, 1985, 19(3): 245-254.
    [20] BOSTOCK M. D3 Example[EB/OL]. [2014-10-11]. https://github.com/mbostock/d3/wiki/Gallery
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(5642) PDF downloads(607) Cited by()

Related
Proportional views

3D Visualization Method for Network Security Data

doi: 10.3969/j.issn.1001-0548.2015.04.020
WU Ya-dong, JIANG Hong-yu, ZHAO Si-rui, LI Bo. 3D Visualization Method for Network Security Data[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 594-598. doi: 10.3969/j.issn.1001-0548.2015.04.020
Citation: WU Ya-dong, JIANG Hong-yu, ZHAO Si-rui, LI Bo. 3D Visualization Method for Network Security Data[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(4): 594-598. doi: 10.3969/j.issn.1001-0548.2015.04.020
Reference (20)

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return